Here’s an overview of some of last week’s most interesting news and podcasts:
Anonymous bloggers in danger of being exposed
You’re a blogger who, for whatever reason, wishes to remain anonymous. But if you use the same Google Analytics account for following the statistics about your sites’ visitors, you’re doomed – connecting all your sites to you is an easy-to-do task if you haven’t taken the aforementioned precautions when setting them up and maintaining them.
Apache reverse proxy flaw opens door to internal networks
Apache has confirmed the existence of a new reverse proxy vulnerability after it was discovered by Prutha Parikh, a security researcher with Qualys.
Feds seize 150 domains for selling counterfeit goods
Seizure orders have been executed against 150 domain names of commercial websites engaged in the illegal sale and distribution of counterfeit goods and copyrighted works.
New mobile security challenges
For years, analysts have predicted most Internet users would end up with an all-in-one device that replaces all others. However, as new devices emerge, users are often adopting new technologies without replacing the old, making the sight of somebody with a laptop, a smartphone, and a tablet familiar to many.
Cyber security trends for financial services in 2012
Booz Allen Hamilton today cited increased cyber threats to senior executives, the impact of organized crime and mobile device security as among the top 10 financial services cyber security trends that will make 2012 a pivotal year for banks and investment firms as they try to stay ahead of the IT security curve.
Significant drop in FakeAV
Three of the most notorious malware families familiar to consumers and businesses have had significant reductions in the malware attacks so far this year.
Facebook worm leads to heavy infection
The researchers of Danish security firm CSIS warn about a new Facebook worm doing rounds and dropping malware.
Researchers explore how cyber attackers think
In a unique collaboration, an engineer and a criminologist are applying criminological concepts and research methods in the study of cybercrime, leading to recommendations for IT managers to use in the prevention of cyber attacks on their networks.
Researcher proves hidden software logs everything on mobile phones
Trevor Eckhart decided to make a video that proves that the Carrier IQ software does, indeed, log things like keystrokes, the text in received and sent SMS messages and that it has insight into browser searches even when HTTPS is used.
Cybercriminals offer complex infection services
Services for fraudsters utilizing malware are not new – AV checkers, malware encryption and malware infection services have existed in the criminal underground market for several years. However, recent research has indicated changes in service scope and price due to service convergence and demanding buyers.
Bogus Apple billing info update request doing rounds
With a spoofed sender email address that looks like it might belong to Apple and a clean, minimalistic “Apple” look, the email will definitely fool some people.
The problem with current malware metrics
In this podcast recorded at Virus Bulletin 2011, Trend Micro’s Global Director of Education David Perry talks about why the currently used malware measurements are not up to the task and about the need to stop sharing with the users statistics that are effectively useless to them.
AT&T and Sprint acknowledge use of Carrier IQ
The Carrier IQ issue continues to unravel as phone manufacturers and some carriers fall over each other in the rush to distance themselves from any involvement with it and the company which produces it.
Norwich Airport database breached
A hacker that goes by the handle “Kahuna” has apparently broken into the systems of the Norwich Airport and has harvested and leaked personal information contained in their job applications’ database.
Yahoo Messenger bug allows status message hijacking
Yahoo Messenger users are in danger of getting their status messages changed without their consent and finding themselves inadvertently peddling malware.